Abstract: An electronic portal image device (EPID) has become
a method of patient-specific IMRT dose verification for radiotherapy.
Research studies have focused on pre and post-treatment verification,
however, there are currently no interventional procedures using EPID
dosimetry that measure the dose in real time as a mechanism to
ensure that overdoses do not occur and underdoses are detected as
soon as is practically possible. As a result, an EPID-based real time
dose verification system for dynamic IMRT was developed and was
implemented with MATLAB/Simulink. The EPID image acquisition
was set to continuous acquisition mode at 1.4 images per second. The
system defined the time constraint gap, or execution gap at the image
acquisition time, so that every calculation must be completed before
the next image capture is completed. In addition, the
Abstract: The curves, of which the square of the distance
between the two points equal to zero, are called minimal or isotropic
curves [4]. In this work, first, necessary and sufficient conditions to
be a Pseudo Helix, which is a special case of such curves, are
presented. Thereafter, it is proven that an isotropic curve-s position
vector and pseudo curvature satisfy a vector differential equation of
fourth order. Additionally, In view of solution of mentioned
equation, position vector of pseudo helices is obtained.
Abstract: This article presents the results using a parametric approach and a Wavelet Transform in analysing signals emitting from the sperm whale. The extraction of intrinsic characteristics of these unique signals emitted by marine mammals is still at present a difficult exercise for various reasons: firstly, it concerns non-stationary signals, and secondly, these signals are obstructed by interfering background noise. In this article, we compare the advantages and disadvantages of both methods: Auto Regressive models and Wavelet Transform. These approaches serve as an alternative to the commonly used estimators which are based on the Fourier Transform for which the hypotheses necessary for its application are in certain cases, not sufficiently proven. These modern approaches provide effective results particularly for the periodic tracking of the signal's characteristics and notably when the signal-to-noise ratio negatively effects signal tracking. Our objectives are twofold. Our first goal is to identify the animal through its acoustic signature. This includes recognition of the marine mammal species and ultimately of the individual animal (within the species). The second is much more ambitious and directly involves the intervention of cetologists to study the sounds emitted by marine mammals in an effort to characterize their behaviour. We are working on an approach based on the recordings of marine mammal signals and the findings from this data result from the Wavelet Transform. This article will explore the reasons for using this approach. In addition, thanks to the use of new processors, these algorithms once heavy in calculation time can be integrated in a real-time system.
Abstract: This paper investigates experimentally and
analytically the torsion behavior of steel fibered high strength self
compacting concrete beams reinforced by GFRP bars. Steel fibered
high strength self compacting concrete (SFHSSCC) and GFRP bars
became in the recent decades a very important materials in the
structural engineering field. The use of GFRP bars to replace steel
bars has emerged as one of the many techniques put forward to
enhance the corrosion resistance of reinforced concrete structures.
High strength concrete and GFRP bars attract designers and
architects as it allows improving the durability as well as the esthetics
of a construction. One of the trends in SFHSSCC structures is to
provide their ductile behavior and additional goal is to limit
development and propagation of macro-cracks in the body of
SFHSSCC elements. SFHSSCC and GFRP bars are tough, improve
the workability, enhance the corrosion resistance of reinforced
concrete structures, and demonstrate high residual strengths after
appearance of the first crack. Experimental studies were carried out
to select effective fiber contents. Three types of volume fraction from
hooked shape steel fibers are used in this study, the hooked steel
fibers were evaluated in volume fractions ranging between 0.0%,
0.75% and 1.5%. The beams shape is chosen to create the required
forces (i.e. torsion and bending moments simultaneously) on the test
zone. A total of seven beams were tested, classified into three groups.
All beams, have 200cm length, cross section of 10×20cm,
longitudinal bottom reinforcement of 3
Abstract: This paper presents the findings of two experiments that were performed on the Redundancy in Wireless Connection Model (RiWC) using the 802.11b standard. The experiments were simulated using OPNET 11.5 Modeler software. The first was aimed at finding the maximum number of simultaneous Voice over Internet Protocol (VoIP) users the model would support under the G.711 and G.729 codec standards when the packetization interval was 10 milliseconds (ms). The second experiment examined the model?s VoIP user capacity using the G.729 codec standard along with background traffic using the same packetization interval as in the first experiment. To determine the capacity of the model under various experiments, we checked three metrics: jitter, delay and data loss. When background traffic was added, we checked the response time in addition to the previous three metrics. The findings of the first experiment indicated that the maximum number of simultaneous VoIP users the model was able to support was 5, which is consistent with recent research findings. When using the G.729 codec, the model was able to support up to 16 VoIP users; similar experiments in current literature have indicated a maximum of 7 users. The finding of the second experiment demonstrated that the maximum number of VoIP users the model was able to support was 12, with the existence of background traffic.
Abstract: Gesture recognition is a challenging task for extracting
meaningful gesture from continuous hand motion. In this paper, we propose an automatic system that recognizes isolated gesture,
in addition meaningful gesture from continuous hand motion for Arabic numbers from 0 to 9 in real-time based on Hidden Markov Models (HMM). In order to handle isolated gesture, HMM using
Ergodic, Left-Right (LR) and Left-Right Banded (LRB) topologies is applied over the discrete vector feature that is extracted from stereo
color image sequences. These topologies are considered to different
number of states ranging from 3 to 10. A new system is developed to recognize the meaningful gesture based on zero-codeword detection
with static velocity motion for continuous gesture. Therefore, the
LRB topology in conjunction with Baum-Welch (BW) algorithm for
training and forward algorithm with Viterbi path for testing presents the best performance. Experimental results show that the proposed system can successfully recognize isolated and meaningful gesture and achieve average rate recognition 98.6% and 94.29% respectively.
Abstract: The paper deals with the comparison study of
harmonic detection methods for a shunt active power filter. The
%THD and the power factor value at the PCC point after
compensation are considered for the comparison. There are three
harmonic detection methods used in the paper that are synchronous
reference frame method, synchronous detection method, and DQ axis
with Fourier method. In addition, the ideal current source is used to
represent the active power filter by assuming an infinitely fast
controller action of the active power filter. The simulation results
show that the DQ axis with Fourier method provides the minimum
%THD after compensation compared with other methods. However,
the power factor value at the PCC point after compensation is slightly
lower than that of synchronous detection method.
Abstract: The research focuses on the effects of polyphenols
extracted from Sambucus nigra fruit, using an experimental arterial
hypertension pattern, as well as their influence on the oxidative
stress. The results reveal the normalization of the reduced glutathion
concentration, as well as a considerable reduction in the
malondialdehide serum concentration by the polyphenolic protection.
The rat blood pressure values were recorded using a CODATM
system, which uses a non-invasive blood pressure measuring method.
All the measured blood pressure components revealed a biostatistically
significant (p
Abstract: In this paper, we propose a novel adaptive
spatiotemporal filter that utilizes image sequences in order to remove
noise. The consecutive frames include: current, previous and next
noisy frames. The filter proposed in this paper is based upon the
weighted averaging pixels intensity and noise variance in image
sequences. It utilizes the Appropriate Number of Consecutive Frames
(ANCF) based on the noisy pixels intensity among the frames. The
number of consecutive frames is adaptively calculated for each
region in image and its value may change from one region to another
region depending on the pixels intensity within the region. The
weights are determined by a well-defined mathematical criterion,
which is adaptive to the feature of spatiotemporal pixels of the
consecutive frames. It is experimentally shown that the proposed
filter can preserve image structures and edges under motion while
suppressing noise, and thus can be effectively used in image
sequences filtering. In addition, the AWA filter using ANCF is
particularly well suited for filtering sequences that contain segments
with abruptly changing scene content due to, for example, rapid
zooming and changes in the view of the camera.
Abstract: Operational risk has become one of the most discussed topics in the financial industry in the recent years. The reasons for this attention can be attributed to higher investments in information systems and technology, the increasing wave of mergers and acquisitions and emergence of new financial instruments. In addition, the New Basel Capital Accord (known as Basel II) demands a capital requirement for operational risk and further motivates financial institutions to more precisely measure and manage this type of risk. The aim of this paper is to shed light on main characteristics of operational risk management and common applied methods: scenario analysis, key risk indicators, risk control self assessment and loss distribution approach.
Abstract: From year to year, the incidence of different diseases is increasing in humans, and the cause is inadequate intake of dietary fibre, vitamins, and minerals. One of the possibilities to take care of your health preventively is including in the diet products with increased dietary fibre, vitamin, and mineral content.Jerusalem artichoke powder (JAP) made from Jerusalem artichoke (Helianthus tuberosus L) roots is a valuable product. By adding it to pastry goods, we can obtain a fibre-rich food that could be healthier and an excellent alternative to the classical pastry products of this kind.Experiments were carried out at the Faculty of Food Technology of Latvia University of Agriculture (LLU). Results of experiments showed that addition of Jerusalem artichoke powder has significant impact on all the studied pastry products nutritional value (p
Abstract: Inthis paper, design and fabrication of vertical
micromirror for optical switching applications of single mode optical
fibers are proposed. The structure of micromirror will be created
from negative photoresist (SU-8) on X-ray lithography using X-ray
from synchrotron light source. The properties of X-ray from
synchrotron light source are high-energy electrons which can
construct materials that have a high aspect ratio. In addition, the
technique of gold coating of reflective material has been used for
change direction of light between two pairs of optical fibers. At a
wavelength of 1310 nm with minimum average loss of 5.305 dB is
obtained.
Abstract: The standard approach to image reconstruction is to stabilize the problem by including an edge-preserving roughness penalty in addition to faithfulness to the data. However, this methodology produces noisy object boundaries and creates a staircase effect. The existing attempts to favor the formation of smooth contour lines take the edge field explicitly into account; they either are computationally expensive or produce disappointing results. In this paper, we propose to incorporate the smoothness of the edge field in an implicit way by means of an additional penalty term defined in the wavelet domain. We also derive an efficient half-quadratic algorithm to solve the resulting optimization problem, including the case when the data fidelity term is non-quadratic and the cost function is nonconvex. Numerical experiments show that our technique preserves edge sharpness while smoothing contour lines; it produces visually pleasing reconstructions which are quantitatively better than those obtained without wavelet-domain constraints.
Abstract: This study aims at investigating the empirical
relationships between risk preference, internet preference, and
internet knowledge which are known as user characteristics, in
addition to perceived risk of the customers on the internet purchase
intention. In order to test the relationships between the variables of
model 174, a questionnaire was collected from the students with
previous online experience. For the purpose of data analysis,
confirmatory factor analysis (CFA) and structural equation model
(SEM) was used.
Test results show that the perceived risk affects the internet
purchase intention, and increase or decrease of perceived risk
influences the purchase intention when the customer does the internet
shopping. Other factors such as internet preference, knowledge of the
internet, and risk preference affect the internet purchase intention.
Abstract: Drought is one of the most important natural disasters which is probable to occur in all regions with completely different climates and in addition to causing death. It results in many economic losses and social consequences. For this reason. Studying the effects and losses caused by drought which include limitation or shortage of agricultural and drinking water resources. Decreased rainfall and increased evapotranspiration. Limited plant growth and decreased agricultural products. Especially those of dry-farming. Lower levels of surface and ground waters and increased immigrations. Etc. in the country is statistical period (1988-2007) for six stations in Roudbar town were used for statistical analysis and calculating humid and dry years. The dependable rainfall index (DRI) was the main method used in this research. Results showed that during the said statistical period and also during the years 1996-1998 and 2007. more than half of the stations had faced drought. With consideration of the conducted studies. Drawing diagrams and comparing the available data with those of dry and humid years it was found that drought affected agricultural products (e.g.olive) in a way that during the year 1996 1996 drought. Olive groves of Roudbar suffered the greatest damages. Whereupon about 70% of the crops were lost.
Abstract: In this paper, we give an overview of an online elearning
tool which has been developed for kids aged from nine to
eleven years old in Mauritius for the self-study of Mathematics in
order to prepare them for the CPE examination. The software does
not intend to render obsolete the existing pedagogical approaches.
Nowadays, the teaching-learning process is mainly focused towards
the class-room model. Moreover, most of the e-learning platforms
that exist are simply static ways of delivering resources using the
internet. There is nearly no interaction between the learner and the
tool. Our application will enable students to practice exercises online
and also work out sample examination papers. Another interesting
feature is that the kid will not have to wait for someone to correct the
work as the correction will be done online and on the spot. Additional
feedback is also provided for some exercises.
Abstract: This paper is concerned with an improved algorithm
based on the piecewise-smooth Mumford and Shah (MS) functional
for an efficient and reliable segmentation. In order to speed up
convergence, an additional force, at each time step, is introduced
further to drive the evolution of the curves instead of only driven by
the extensions of the complementary functions u + and u - . In our
scheme, furthermore, the piecewise-constant MS functional is
integrated to generate the extra force based on a temporary image that
is dynamically created by computing the union of u + and u - during
segmenting. Therefore, some drawbacks of the original algorithm,
such as smaller objects generated by noise and local minimal problem
also are eliminated or improved. The resulting algorithm has been
implemented in Matlab and Visual Cµ, and demonstrated efficiently
by several cases.
Abstract: The majority of existing predictors for time series are
model-dependent and therefore require some prior knowledge for the
identification of complex systems, usually involving system
identification, extensive training, or online adaptation in the case of
time-varying systems. Additionally, since a time series is usually
generated by complex processes such as the stock market or other
chaotic systems, identification, modeling or the online updating of
parameters can be problematic. In this paper a model-free predictor
(MFP) for a time series produced by an unknown nonlinear system or
process is derived using tracking theory. An identical derivation of the
MFP using the property of the Newton form of the interpolating
polynomial is also presented. The MFP is able to accurately predict
future values of a time series, is stable, has few tuning parameters and
is desirable for engineering applications due to its simplicity, fast
prediction speed and extremely low computational load. The
performance of the proposed MFP is demonstrated using the
prediction of the Dow Jones Industrial Average stock index.
Abstract: The main goal of this work is to propose a way for
combined use of two nontraditional algorithms by solving topological
problems on telecommunications concentrator networks. The
algorithms suggested are the Simulated Annealing algorithm and the
Genetic Algorithm. The Algorithm of Simulated Annealing unifies
the well known local search algorithms. In addition - Simulated
Annealing allows acceptation of moves in the search space witch lead
to decisions with higher cost in order to attempt to overcome any
local minima obtained. The Genetic Algorithm is a heuristic approach
witch is being used in wide areas of optimization works. In the last
years this approach is also widely implemented in
Telecommunications Networks Planning. In order to solve less or
more complex planning problem it is important to find the most
appropriate parameters for initializing the function of the algorithm.
Abstract: Nowadays, the rapid development of multimedia
and internet allows for wide distribution of digital media data.
It becomes much easier to edit, modify and duplicate digital
information Besides that, digital documents are also easy to
copy and distribute, therefore it will be faced by many
threatens. It-s a big security and privacy issue with the large
flood of information and the development of the digital
format, it become necessary to find appropriate protection
because of the significance, accuracy and sensitivity of the
information. Nowadays protection system classified with more
specific as hiding information, encryption information, and
combination between hiding and encryption to increase information
security, the strength of the information hiding science is due to the
non-existence of standard algorithms to be used in hiding secret
messages. Also there is randomness in hiding methods such as
combining several media (covers) with different methods to pass a
secret message. In addition, there are no formal methods to be
followed to discover the hidden data. For this reason, the task of this
research becomes difficult. In this paper, a new system of information
hiding is presented. The proposed system aim to hidden information
(data file) in any execution file (EXE) and to detect the hidden file
and we will see implementation of steganography system which
embeds information in an execution file. (EXE) files have been
investigated. The system tries to find a solution to the size of the
cover file and making it undetectable by anti-virus software. The
system includes two main functions; first is the hiding of the
information in a Portable Executable File (EXE), through the
execution of four process (specify the cover file, specify the
information file, encryption of the information, and hiding the
information) and the second function is the extraction of the hiding
information through three process (specify the steno file, extract the
information, and decryption of the information). The system has
achieved the main goals, such as make the relation of the size of the
cover file and the size of information independent and the result file
does not make any conflict with anti-virus software.